Description
Exposure of senstive information to an unauthorised actor in the "com.onepeloton.erlich" mobile application up to and including version 1.7.22 allows a remote attacker to access developer files stored in an AWS S3 bucket, by reading credentials stored in plain text within the mobile application.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-27702 | Exposure of senstive information to an unauthorised actor in the "com.onepeloton.erlich" mobile application up to and including version 1.7.22 allows a remote attacker to access developer files stored in an AWS S3 bucket, by reading credentials stored in plain text within the mobile application. |
References
| Link | Providers |
|---|---|
| https://twitter.com/ROPsicle/status/1438216078103044107?s=20 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T02:44:10.787Z
Reserved: 2021-09-06T00:00:00.000Z
Link: CVE-2021-40527
No data.
Status : Modified
Published: 2021-10-25T11:15:07.720
Modified: 2024-11-21T06:24:19.660
Link: CVE-2021-40527
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD